Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Vulnerability

Handbook of Research on Managing the Urban-Rural Divide Through an Inclusive Framework
The state of being vulnerable, where the individual or the household does not have the capacity to provide for themselves. The vulnerability can be caused by cultural, social, economic, physical, and political reasons.
Published in Chapter:
Enhancing Social Resilience in Urban Communities: The Case of Urban Agriculture in Harare, Zimbabwe
Joseph Kamuzhanje (Coopers, Zimbabwe)
DOI: 10.4018/978-1-6684-6258-4.ch008
Abstract
Urbanization is growing in both developed and developing countries. The proportion of the world's urban population is expected to increase to 57% by 2050 from 47% in 2000. More than 90% of future population growth will be in the large cities in the developing countries. In the developing world, Africa has experienced the highest urban growth during the last two decades at 3.5% per year, and this rate is expected to hold into 2050. Projections indicate that between 2010 and 2025, some African cities will account for up to 85% of the population. In 2010, the share of the African urban population was 36% and is projected to increase to 50% and 60% by 2030 and 2050, respectively. Due to this growth in urban population, urbanisation, urban poverty, and food and nutrition insecurity have begun to dominate the development discourse again after years of focusing on rural development. Urban agriculture is becoming a viable solution to the challenges that communities are facing.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
A Comprehensive Perspective on Mobile Forensics: Process, Tools, and Future Trends
Vulnerability is a weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
Full Text Chapter Download: US $37.50 Add to Cart
Climate Change Impact on the Water Resources of the Limpopo Basin: Simulations of a Coupled GCM and Hybrid Atmospheric-Terrestrial Water Balance (HATWAB) Model
Vulnerability is the degree to which a system is susceptible to, or unable to cope with, adverse effects of climate change, including climate variability and extremes. Vulnerability is a function of the character, magnitude, and rate of climate change and variation to which a system is exposed, its sensitivity, and its adaptive capacity.
Full Text Chapter Download: US $37.50 Add to Cart
Corporate Social Responsibility and Analysis of Its Social Dimension in Hotels in Malaga
Full Text Chapter Download: US $37.50 Add to Cart
The Cosmos of Bioethics of Displacement
Lacking means of protection or defense opportunities leading to being easily hurt or affected by physical, emotional, or environmental factors.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Considering Instructors' Philosophical Belief Systems and Potential Impact Upon eLearning Engagement: Transformative Social Learning Environments
The ability to set aside one’s preconceptions and deep-seated beliefs, to rethink processes, procedures, ways of viewing the world, and other aspects of the ways that a person preconceives living in the world and being of the world.
Full Text Chapter Download: US $37.50 Add to Cart
Program Responsiveness: Increasing Professional Dispositions With Vulnerability in Graduate Teacher Education
A willingness to take risks, share failures, and reflect on this process, as an element of confidence.
Full Text Chapter Download: US $37.50 Add to Cart
Science, Technocracy, and Artificial Intelligence: An Ethical-Juridical Reflection Prompted by the Current Pandemic
Condition of fragility of an individual, due to which, for example, he can receive damage or discrimination.
Full Text Chapter Download: US $37.50 Add to Cart
Gendering Play, Producing Bodies: The Consequences of Gender in Play Specialism Strategies
The quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Security of Cloud Computing
A security weakness in a system that that could be exploited by an attacker to cause harm.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
National Security Policy and Strategy and Cyber Security Risks
A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard.
Full Text Chapter Download: US $37.50 Add to Cart
A Machine Learning-Based Cyber Defence System for an Intelligent City
A vulnerability is a weakness or flaw that exists in a system due to design, operation procedures or implementation fault. A vulnerability may result in cyber-attack to compromise a system. Result may be data theft, denial of service, or an attempt to access and modify files.
Full Text Chapter Download: US $37.50 Add to Cart
Disruptive Technology Impacts on Security
Any weakness in a system (typically a computer system) that poses a risk of attack to the owner.
Full Text Chapter Download: US $37.50 Add to Cart
Urban Flood Management Under Changing Climate: A Land Use-Based Study of Kochi Urban Area, Kerala
Vulnerability refers to the characteristics and circumstances of a community, system or asset that make it susceptible to the damaging effects of a hazard ( UNISDR, 2009 AU92: The citation "UNISDR, 2009" matches multiple references. Please add letters (e.g. "Smith 2000a"), or additional authors to the citation, to uniquely match references and citations. ). Vulnerability involves a combination of factors that determine the degree to which a person or community, livelihood, assets, ecosystem are put at risk by a discrete and identifiable event in the nature.
Full Text Chapter Download: US $37.50 Add to Cart
Threats and Vulnerabilities of Mobile Applications
Refers to a flaw in the computer system, which creates a way open to the attack.
Full Text Chapter Download: US $37.50 Add to Cart
Business Continuity of Critical Infrastructures for Safety and Security Incidents
Weaknesses of an infrastructure towards security and safety threats due to lack of measures, policies or strategy.
Full Text Chapter Download: US $37.50 Add to Cart
Classification of Spamming Attacks to Blogging Websites and Their Security Techniques
It is defined as a defect, imperfection, weakness, or inadequacy of a system.
Full Text Chapter Download: US $37.50 Add to Cart
Managing Risk in Global Food Supply Chains: Improving Food Security and Sustainability
The conditions determined by physical, social, economic and environmental factors or processes which increase the susceptibility of an individual, a community, assets or systems to the impacts of hazards ( ISDR, 2009 ).
Full Text Chapter Download: US $37.50 Add to Cart
Requirements and Life Cycle Model-Based Assessment of NPP I&C Systems Cyber Security and Safety
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
Full Text Chapter Download: US $37.50 Add to Cart
The Challenge of Adequately Defining Technical Risk
A weakness to an asset or system that can be exploited by a threat actor.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
The Organizational Resilience in Family Firms Studies: Role and Impact in Generational Succession
It is the acceptance of the crisis (e.g., generational succession in FF), and it includes the attributes of people and organizations to suffer and subsequently transform small accidents into disasters.
Full Text Chapter Download: US $37.50 Add to Cart
Vulnerability of Oasis Agriculture to Climate Change in Morocco
Refers to the inability to resist the effects of a hostile environment.
Full Text Chapter Download: US $37.50 Add to Cart
The Effects of the COVID-19 Outbreak on Social Service-Providing Organizations in the Migration Sector in Turkey and the Digital Measures
The condition of susceptibility to harm resulting from developmental problems, personal incapacities, disadvantaged social status, inadequacy of interpersonal networks and supports, degraded environments, and the interactions of these factors over the life course.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Victimization, Cultural Imperatives, and Empowerment of People of Color in the United States
It is the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
A Conceptual Framework to Guide Psychological Resilience Knowledge and Practice Regarding COVID-19: Towards Maintaining Psychological Wellbeing in Pandemic Situations
This is the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally, and is on a reduction basis.
Full Text Chapter Download: US $37.50 Add to Cart
Implicit Cognitive Vulnerability
This term describes the cognitive understanding of the instructional process, wherein the student engages in differentiated understanding and efforts associated with the subject matter being learned. The student’s comfortableness with the information, the student’s comfortableness and engagement within the instructional environment (including the level of trust that the student feels towards the teacher and the other students) can further enhance each student’s ability to openly articulate creative thoughts and ideas, feeling a sense of safety that the student will not be derided for potentially incorrect understandings or “thinking outside the box” creativity that may be unusual understandings and ideas implemented with the subject matter under study.
Full Text Chapter Download: US $37.50 Add to Cart
Societal Intersections and COVID-19 Effects on Young Children Vulnerability: A Transdisciplinary Approach to Holistic Integration
Vulnerability is a humanistic characteristic, an inevitable part of being human. Young children are more susceptible to being vulnerable than at other life stages. Vulnerability is defined as “the likelihood of being harmed by unforeseen events or as susceptibility to exogenous shocks” embedded in the broader spectrum of socio-economic, political, and institutionally interconnected relationships in micro-macro environments (Johnson Harbach, 2020; Better Care Network, 2004).
Full Text Chapter Download: US $37.50 Add to Cart
Students in Socially Vulnerable Contexts: Discovering Their Entrepreneurial Potential
is a broad multidimensional concept that can refer to the person, the family or the population group in which the vulnerability arises. In the context of vulnerability caused by unemployment, constant change and economic uncertainty, etc. The job training proposals for young people are very important.
Full Text Chapter Download: US $37.50 Add to Cart
Information Systems Risk Management: An Audit and Control Approach
Vulnerability is a flaw or weakness in system security procedures, internal controls, or implementation that could be exercised (accidentally triggered or intentionally exploited) and result in loss or harm.
Full Text Chapter Download: US $37.50 Add to Cart
Emerging Cyber Security Threats During the COVID-19 Pandemic and Possible Countermeasures
Vulnerabilities are flaws in a computer system that weaken the overall security of the device/system. Vulnerabilities can be weaknesses in either the hardware itself, or the software that runs on the hardware.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Analytics: Unpacking AIDS Policy in the Black Community
Propensity of poor health and/or lack of access to health care services.
Full Text Chapter Download: US $37.50 Add to Cart
Implementing a Sound Public Information Security Program
A vulnerability is a weakness in a network computer system’s security procedures, administrative controls, system design, implementation, internal controls, or so forth that could be exploited by a threat for one to gain unauthorized access to information, to disrupt critical processing, or to violate a system security policy. It is a flaw that may allow harm to occur to an information technology activity. A measurement of vulnerability, which includes the susceptibility of a particular system to a specific attack and the opportunities available to a threat agent to mount that attack, is known as vulnerability assessment.
Full Text Chapter Download: US $37.50 Add to Cart
The Place of Traditional Ethical Values in Curbing Human Trafficking and the Enhancement of Democratic Principles in Nigeria
Trafficking is linked to the abuse of people in vulnerable situations, which is defined in international and European law. It highlights the lack of alternatives for a victim when submitting to the abuse. Thus, the Council of Europe advocates that the notion of vulnerability is treated in a wide sense by including situations of poverty and economic deprivation.
Full Text Chapter Download: US $37.50 Add to Cart
Food Adulteration: A Challenge for Safer Food
It is a term of art and a basis for assessment methods in several contexts, including climate impact analysis, disaster management, and food security analysis. ‘Vulnerability’ is used because food fraud ‘risks’ do not exactly fit with the accepted definition of risk as something that has occurred frequently, will occur again and for which there is enough data to make quantitative assessments.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Cost Estimation and Security Investment of Security Projects
Is a defect or weakness in information system’s assets or mechanisms, which could lead to a security breach when exploited by malicious entities.
Full Text Chapter Download: US $37.50 Add to Cart
How Can a Cybersecurity Student Become a Cybersecurity Professional and Succeed in a Cybersecurity Career?
A vulnerability is any weakness in a product, process or system which could potentially be exploited to reduce the security or function of that product, process, or system.
Full Text Chapter Download: US $37.50 Add to Cart
Commodification of Human Beings and Power Imbalance in Human Trafficking: Ethical Implications
Trafficking is to a great extent linked to the various kind of abuse of people in vulnerable situations. It is defined in assortment of ways in statute books and international instruments. It highlights the lack of alternatives for a victim when submitting to the abuse. Thus, different groups advocates that the notion of vulnerability is treated in a wide sense by including situations of poverty and economic deprivation.
Full Text Chapter Download: US $37.50 Add to Cart
Ethical Implications of the Logic of Economic Gain Devoid of Respect for Human Dignity: A Human Trafficking Experience
Trafficking is to a great extent linked to the various kind of abuse of people in vulnerable situations. It is defined in assortment of ways in statute books and international instruments. It highlights the lack of alternatives for a victim when submitting to the abuse. Thus different groups advocates that the notion of vulnerability is treated in a wide sense by including situations of poverty and economic deprivation.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security and Risk Management
A weakness or flaw in an organization’s system that might be exploited to compromise security.
Full Text Chapter Download: US $37.50 Add to Cart
Network Worms
A weakness or bug in software programs that could lead to a security compromise if exploited.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber-Physical Security in Healthcare
Weakness of an asset or control that can be exploited by one or more threats. The existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the computer system, network, application, or protocol involved.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
The Condition of Vulnerability in the Educational Context: Ethical Considerations and Juridical Perspectives
Condition of fragility of an individual, due to which, for example, he can receive damage or discrimination.
Full Text Chapter Download: US $37.50 Add to Cart
Faculty Vulnerability: A Restorative Experiential Learning Activity for Academically-Disengaged College Students
Allowing oneself to be open and transparent with students about a range of lived experiences to increase student insight and engagement.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Creativity and Impactful Learning Through Implicit Cognitive Vulnerability
Allowing others to view one’s fragileness and disruptive dissonance, especially throughout the learning process within this discussion.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Management and Cost Estimation of Security Projects
A defect or weakness in information system’s assets or mechanisms, which could lead to a security breach when exploited by malicious entities.
Full Text Chapter Download: US $37.50 Add to Cart
E-Planning: Information Security Risks and Management Implications
A weakness in a network computer system security procedures, administrative controls, system design, implementation, internal controls, etc. that could be exploited by a threat to gain an unauthorized access to information, disrupt critical processing, or violate a system security policy.
Full Text Chapter Download: US $37.50 Add to Cart
Preference Reversal Under Vulnerability: An Application of Neural Networks in Mexican Family Firms
Situation that puts firm survival at risk, such as low performance, low levels of slack resources, and public pressure.
Full Text Chapter Download: US $37.50 Add to Cart
Adaptation to Climate Change for Sustainable Development: A Survey
Vulnerability, in this context, may be defined as the diminished capacity of an individual or group to anticipate, cope with, resist and recover from the impact of a natural or man-made hazard. The concept is relative and dynamic. Vulnerability is most often associated with poverty, but it can also arise when people are isolated, insecure and defenceless in the face of risk, shock or stress. People differ in their exposure to risk as a result of their social group, gender, ethnic or other identity, age and other factors.
Full Text Chapter Download: US $37.50 Add to Cart
Disproportional Influence and Vulnerability Infringement in Human Trafficking: Ethico-Economic Implications
Vulnerability is the characteristics determined by either social, economic and/or environmental factors which increase the susceptibility of one to risk or the impacts of hazards. Traffickers look for people who are vulnerable and therefore easier to exploit. It is obvious that vulnerability is the primary human condition. To be human is to be vulnerable very many things such as disease, cold, poverty, hunger, coercion, manipulation or deception, and the disruption of social relationships on which we depend. In human trafficking for instance, most of the victims of human trafficking are vulnerable not just in the ‘ontological’ sense that all humans are vulnerable, but in the sense that their condition or particular situation makes them more vulnerable than others (Fineman, 2014).
Full Text Chapter Download: US $37.50 Add to Cart
The Relational Dimension of Care at the Foundation of the Rights of Pupils With SEN: Between Inclusiveness and Substantive Equality
Condition of fragility of an individual, due to which, for example, he can receive damage or discrimination.
Full Text Chapter Download: US $37.50 Add to Cart
Threat Modeling and Secure Software Engineering Process
A weakness in software that can be exploited by a threat to cause harm to the process the software is designed to perform.
Full Text Chapter Download: US $37.50 Add to Cart
Exploring the Legal Framework of Climate Migration in Latin America
The position to be susceptible to different phenomena, endangering the well-being and survival of a country or individual.
Full Text Chapter Download: US $37.50 Add to Cart
Malicious Software in Mobile Devices
Vulnerability is a security flaw in operating systems or applications that could be exploited to attack the host.
Full Text Chapter Download: US $37.50 Add to Cart
Psychosocial Support and Education of Vulnerable Children: Implications for Policy and Implimentation
The inability (of a system or a unit) to withstand the effects of a hostile environment is referred to as vulnerability. It is a state of emotional vulnerability accompanied by a degree of uncertainty. A window of vulnerability is a period of time during which defensive measures are reduced, compromised, or absent.
Full Text Chapter Download: US $37.50 Add to Cart
Parental/Guardian Subsidization of Extra Tuition and the Marginalization of the Poor in Zimbabwe: Social Exclusion in Education Sector in Zimbabwe
This refers to the lack of capacity by a person, a group of persons, or a community to fend for itself. The inability to meet basic human needs.
Full Text Chapter Download: US $37.50 Add to Cart
Enterprise Information System Security: A Life-Cycle Approach
This is an inherent weakness associated with an enterprise asset. It is a condition that has the potential to allow a threat to occur with greater impact and greater frequency or both.
Full Text Chapter Download: US $37.50 Add to Cart
Vulnerabilities of Secure and Reliable Low-Power Embedded Systems and Their Analysis Methods: A Comprehensive Study
Vulnerability describes a certain inability of a system to withstand the effects of an attack in a hostile environment.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Security Assessment of NPP I&C Systems
Weakness of an asset or control that can be exploited by a threat.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Policies: Precepts and Practices
is a flaw or weakness that may allow harm to occur to an IT system or activity.
Full Text Chapter Download: US $37.50 Add to Cart
Malicious Software
A security weakness in operating system or application software.
Full Text Chapter Download: US $37.50 Add to Cart
Ethical Conflicts Regarding Technical Assistance Systems for the Elderly
The source of many moral intuitions and responsibilities is the recognition that there are vulnerable individuals or groups who are susceptible to being harmed, i.e. who are less protected against a certain disposition or a status facing outer and inner impairment. This also refers to a failure of a selfregulating mechanism of the organism. Questions of informed consent require special attention in vulnerable populations who are particularly susceptible to injury or harm.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity and Electronic Services Oriented to E-Government in Europe
A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard. Characteristic of location or security posture or of design, security procedures, internal controls, or the implementation of any of these that permit a threat or hazard to occur. Vulnerability (expressing degree of vulnerability): qualitative or quantitative expression of the level of susceptibility to harm when a threat or hazard is realized.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Assessment of Disruption Risks in Supply Chains
The condition of a facility or a transportation link that is susceptible to disruption.
Full Text Chapter Download: US $37.50 Add to Cart
Addressing the Sustainable Development Goals Through Environmental Education
The degree to which a system is susceptible to, or unable to cope with, adverse effects of climate change, including climate variability and extremes.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Secure Architecture for Cloud Environment
A weakness which allows an attacker to reduce a system's information assurance.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Evolution of Malware in the Digital Transformation Age
Vulnerability refers to the inability (of a system or a unit) to withstand the effects of a hostile environment.
Full Text Chapter Download: US $37.50 Add to Cart
Crime and Victimization in Cyberspace: A Socio-Criminological Approach to Cybercrime
Refers to a known weakness of an asset that can be exploited by one or more attackers. Vulnerability can concern computers system, devices, networks or can also be at organizational level.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Policy in Large Public Organizations: A Case Study Through ISO 27002
Full Text Chapter Download: US $37.50 Add to Cart
Representation of Syrian Children in Turkish Media From a Child-Oriented Rights Journalism Perspective
Vulnerability is “the group of children that experience negative outcomes, such as the loss of their education, morbidity, and malnutrition, at higher rates than do their peers”.(4) The main categories of vulnerable children outlined in this toolkit are Street children, Children in the worst forms of child labor, Children affected by armed conflict, Children affected by HIV/AIDS, Children living with disabilities.
Full Text Chapter Download: US $37.50 Add to Cart
Industrial Applications of Emulation Techniques for the Early Evaluation of Secure Low-Power Embedded Systems
Vulnerability describes a certain inability of a system to withstand the effects of an attack in a hostile environment.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR